A vulnerability classified as critical has been found in KylinSoft kylin-system-updater up to 2.0.5.16-0k2.33. Affected is an unknown function of the file /usr/share/kylin-system-updater/SystemUpdater/UpgradeStrategiesDbus.py of the component com.kylin.systemupgrade Service. The manipulation of the argument SetDownloadspeedMax leads to os command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248940. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://note.zhaoj.in/share/L1hGe9BDlbnt | Broken Link |
https://vuldb.com/?ctiid.248940 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.248940 | Permissions Required Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-12-24T23:31:04.019Z
Updated: 2024-02-13T07:30:22.399Z
Reserved: 2023-12-24T08:03:50.706Z
Link: CVE-2023-7093
JSON object: View
NVD Information
Status : Modified
Published: 2023-12-25T00:15:08.400
Modified: 2024-05-17T02:34:08.893
Link: CVE-2023-7093
JSON object: View
Redhat Information
No data.
CWE